CN108563931A - A kind of data security protection method and system - Google Patents
A kind of data security protection method and system Download PDFInfo
- Publication number
- CN108563931A CN108563931A CN201810415380.3A CN201810415380A CN108563931A CN 108563931 A CN108563931 A CN 108563931A CN 201810415380 A CN201810415380 A CN 201810415380A CN 108563931 A CN108563931 A CN 108563931A
- Authority
- CN
- China
- Prior art keywords
- polar plot
- data file
- data
- file
- sensitive data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
- Image Processing (AREA)
Abstract
The present invention is suitable for data security arts, provides a kind of data security protection method and system, the method includes:When detect user just in access sensitive data file when, generate polar plot at random;The polar plot is made an addition to the white space of the sensitive data file, and records audit information corresponding with the polar plot;File destination is obtained, when detecting in the file destination there are when the polar plot, polar plot generating algorithm is decrypted, obtains the audit information.By adding polar plot in sensitive data file, and it preserves and the audit information corresponding to the polar plot, when the sensitive data file for being added to the quantity figure is illegally propagated, after printing, taking pictures, corresponding audit information can be obtained according to the polar plot, since audit information includes user's name, the source of divulging a secret can be known.
Description
Technical field
The present invention relates to data security arts more particularly to a kind of data security protection method and systems.
Background technology
With being constantly progressive for science and technology, the frequency and speed of information interchange are getting faster, for the number of some need for confidentiality
According to file, owner is concerned about the propagation for how preventing these data files very much.
The prior art is there are a kind of printing watermark Anticompromise Technique, water of the attachment with enterprise's mark when generally use prints
Print, these watermarks usually all can be obvious and influence printing effect and reading, and watermark is too apparent, can remind and let out
Close person propagates again after first handling watermark, prints watermark by attachment to be extremely difficult to by traces raw propagation person,
The problem of data file of control need for confidentiality is divulged a secret so that data file owner exists causes nothing because data file is divulged a secret
The loss that method is estimated.
Invention content
The embodiment of the present invention provides a kind of data security protection method, it is intended to which solution traces raw propagation in the prior art
Person controls the problem of data file of need for confidentiality is divulged a secret.
The embodiment of the present invention is achieved in that the embodiment of the present invention provides a kind of data security protection method comprising:
When detect user just in access sensitive data file when, generate polar plot at random;
The polar plot is made an addition to the white space of the sensitive data file, and is recorded corresponding with the polar plot
Audit information;
File destination is obtained, when detecting in the file destination there are when the polar plot, decrypts polar plot generating algorithm,
Obtain the audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
The embodiment of the present invention also provides a kind of data security protecting system comprising has:
Polar plot generation unit, for when detect user just in access sensitive data file when, generate polar plot at random;
Print auditing unit, the white space for the polar plot to be made an addition to the sensitive data file, and record
Audit information corresponding with the polar plot;
Audit information acquiring unit, for obtaining file destination, when detecting in the file destination, there are the polar plots
When, polar plot generating algorithm is decrypted, the audit information is obtained;
The audit information includes active user's title, current sensitive data file and vector map data.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right
The audit information answered, can be according to this after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated
Polar plot obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
Description of the drawings
Fig. 1 is a kind of flow chart of data security protection method provided in an embodiment of the present invention;
Fig. 2 printing vector map flow charts provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data security protecting system provided in an embodiment of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The embodiment of the present invention, can after sensitive data file is transmitted by adding polar plot in sensitive data file
To be audited information according to the polar plot, file propagation person is traced, improves data security protecting ability.
Fig. 1 shows a kind of data security protection method provided in an embodiment of the present invention, and details are as follows:
In step S101, whether detection user is just in access sensitive data file, and when testing result is yes, then entrance walks
Rapid S102;When testing result is no, then flow restarts.
In embodiments of the present invention, sensitive data file be need to control propagate, the data file of circulation, can be for example, by
It is added to certain special tags in the data file, to show security sensitive.
Sensitive data rule is pre-defined, user accesses data is worked as by HOOK technologies as one embodiment of the invention
When file, judge to be accessed whether data are sensitive data by rule verification.
In embodiments of the present invention, access can be the operations such as to read, print.
In step s 102, polar plot is generated at random.
In embodiments of the present invention, polar plot is generated by Encryption Algorithm.
As one embodiment of the invention, the polar plot is the dot made an addition in sensitive data file white space.
It is using the advantage of dot, it is hidden enough, it is not easy to be found, after can preventing blabber from finding, be removed by technological means
It is propagated again after falling watermark, causes subsequently trace the problem of divulging a secret source.
As a preferred embodiment of the invention, the dot is multiple.Using the scheme of multiple dots, even if divulging a secret
Person has found one of them or several dot watermarks, and after being handled by technological means, as long as there is also it on the paper of printing
Remaining dot watermark, can trace back to immediate blabber.
As a preferred embodiment of the invention, the size of the dot is a pixel, and the dot of the size is enough
It is hidden, it is not easy to be found, and data exhibiting will not be blocked, avoid impacting user's vision so that office and reading are more
Add smooth.
In step s 103, the polar plot is made an addition to the white space of sensitive data file, and is recorded and the vector
Scheme corresponding audit information.
In embodiments of the present invention, the audit information includes active user's title, current sensitive data file and vector
Diagram data.
In embodiments of the present invention, the vector map data is for restoring polar plot and its position in sensitive data file
It sets, may include dot in X-axis and the coordinate ratio of Y-axis, the character accompanying by character and dot accompanying by dot
Several forward and backward character strings.
Due to vector map data contain the character accompanying by character and dot accompanying by dot it is forward and backward several
Character string, when can be to avoid a character of only dot corresponding attachment, query result might have repetition, and accuracy is not high
The problem of.
As a preferred embodiment of the invention, the number of above-mentioned character string is 5.
In embodiments of the present invention, the dot makes an addition to the lower left of corresponding character according to preset coordinate axis, can prevent from justifying
Point with underscore of the addition immediately below character, symbol or punctuate coincide emphatically, influence subsequent polar plot and detect.
As one embodiment of the invention, in practical applications, dot is attached to the position of header and footer in order to prevent,
When sensitive data file is A4 lateral lattice, added on A4 paper polar plot ranging from according to the ratio of A4 paper remove it is upper and lower,
In left and right 10% regional extent.
In step S104, file destination is obtained, and detects and whether there is polar plot in file destination, if testing result is
It is then to enter step S105, if testing result is no, flow terminates.
In step S105, polar plot generating algorithm is decrypted, obtains audit information, so as to be judged according to the audit information
It divulges a secret source.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right
The audit information answered, can be according to arrow after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated
Spirogram obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
The protection that sensitive data in operation system has been greatly reinforced by this method plays the printing operation of sensitive data
To the effect of tracking and monitoring, and controlling unit is introduced in operation system flow, has prevented sensitive data printing circulation way
Randomness, further, since the presence of watermark for business personnel sensitive data file each time operation all have deterrent
With it is traceable, so that data safety theory is goed deep into a line, the present invention has accomplished that the operation of sensitive data is controllable, to promote sensitive number
According to it is safe to use, even if sensitive data actively or passively divulge a secret, it is only necessary to find the polar plot got compromised on object
Position blabber for the first time so that the safety of sensitive data file greatly promotes.
As one embodiment of the invention, when tracing sensitive data file source, according to dot adhere to corresponding position with
And several character strings before and after dot, inquired in the audit information of system storage most matched as a result, judging to divulge a secret whereby
Source.
As a kind of preferred embodiment of the present invention, the quantity of the character string is 5.
As a preferred embodiment of the invention, the sensitive data file captured is analyzed by HOOK technologies, with picture
Element is that addition content is analyzed and spliced to unit, adheres to dot under the character of printing using the windows graphic interface GDI provided
The data volume of watermark, dot watermark is completed by page configuration at random with size, and dot watermark random printing is not changing user
In the case of custom, watermark addition is realized.
With reference to Fig. 2, by a specific print procedure, how explanation adds vector in sensitive data file
Figure, and data security protecting is carried out, details are as follows:
In step s 201, administrator enables strategy by WEB interface;
In step S202, background program Provisioning Policy is to client;
In step S203, client reception strategy;
In step S204, user executes printing;
In step S205, vector watermark strategy is judged whether, if so, S206 is thened follow the steps, if it is not, then executing
Step S207;
In step S206, printing content is obtained, watermark is generated according to algorithm and is added, and watermark identifier is uploaded to
From the background;
In step S207, printing.
Fig. 3 shows a kind of data security protecting system provided in an embodiment of the present invention, for purposes of illustration only, only showing and this
Invent relevant part.
Data security protecting system provided in an embodiment of the present invention includes:
Polar plot generation unit 100, for when detect user just in access sensitive data file when, generate vector at random
Figure;
In embodiments of the present invention, sensitive document is that the personnel for controlling sensitive data file propagation, circulating is needed to exist in advance
It is set in sensitive data file, such as is added to certain special tags in the data file, to show the file of secrecy.
Sensitive data rule is pre-defined, user accesses data is worked as by HOOK technologies as one embodiment of the invention
When file, judge to be accessed whether data are sensitive data by rule verification.
In embodiments of the present invention, access can be the operations such as to read, print.
In embodiments of the present invention, polar plot is generated by Encryption Algorithm.
As one embodiment of the invention, the polar plot is the dot made an addition in sensitive data file white space.
It is using the advantage of dot, it is hidden enough, it is not easy to be found, after can preventing blabber from finding, be removed by technological means
It is propagated again after falling watermark, causes subsequently trace the problem of divulging a secret source.
As a preferred embodiment of the invention, the dot is multiple.Using the scheme of multiple dots, even if divulging a secret
Person has found one of them or several dot watermarks, and after being handled by technological means, as long as there is also it on the paper of printing
Remaining dot watermark, can trace back to immediate blabber.
As a preferred embodiment of the invention, the size of the dot is a pixel, and the dot of the size is enough
It is hidden, it is not easy to be found, and data exhibiting will not be blocked, avoid impacting user's vision so that office and reading are more
Add smooth.
Print auditing unit 200, the white space for the polar plot to be made an addition to sensitive data file, and record with
The corresponding audit information of the polar plot.
In embodiments of the present invention, the audit information includes active user's title, current sensitive data file and vector
Diagram data.
In embodiments of the present invention, the vector map data is for restoring polar plot and its position in sensitive data file
It sets, may include dot in X-axis and the coordinate ratio of Y-axis, the character accompanying by character and dot accompanying by dot
Several forward and backward character strings.
In embodiments of the present invention, the dot makes an addition to the lower left of corresponding character according to preset coordinate axis.
As one embodiment of the invention, in practical applications, dot is attached to the position of header and footer in order to prevent,
When sensitive data file is A4 lateral lattice, added on A4 paper polar plot ranging from according to the ratio of A4 paper remove it is upper and lower,
In left and right 10% regional extent.
Audit information acquiring unit 300, for when detecting in the file destination there are when the polar plot, decrypting vector
Figure generating algorithm obtains audit information, so as to judge source of divulging a secret according to the audit information.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right
The audit information answered, can be according to this after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated
Polar plot obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
The protection that sensitive data in operation system has been greatly reinforced by this method plays the printing operation of sensitive data
To the effect of tracking and monitoring, and controlling unit is introduced in operation system flow, has prevented sensitive data printing circulation way
Randomness, further, since the presence of watermark for business personnel sensitive data file each time operation all have deterrent
With it is traceable, so that data safety theory is goed deep into a line, the present invention has accomplished that the operation of sensitive data is controllable, to promote sensitive number
According to it is safe to use, even if sensitive data actively or passively divulge a secret, it is only necessary to find the polar plot got compromised on object
Position blabber for the first time so that the safety of sensitive data file greatly promotes.
As one embodiment of the invention, when tracing sensitive data file source, according to dot adhere to corresponding position with
And 5 character strings before and after dot, inquired in the audit information of system storage most matched as a result, judging source of divulging a secret whereby.
As a preferred embodiment of the invention, the data captured are analyzed by HOOK technologies, as unit of pixel
To analyze and splicing printing content, adhere to dot watermark under the character of printing using the windows graphic interface GDI provided,
The data volume of dot watermark is completed by page configuration at random with size, dot watermark random printing.
Wherein, the watermark dot in polar plot is attached to the lower left of each character, and the information of upload includes the X/ of dot
The coordinate ratio of Y-axis, the corresponding character of dot attachment, dot adhere to corresponding front and back 5 character strings, the watermark in polar plot
Dot attachment number is configured by page policy, and embedded location is random.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (10)
1. a kind of data security protection method, which is characterized in that described method includes following steps:
When detect user just in access sensitive data file when, generate polar plot at random;
The polar plot is made an addition to the white space of the sensitive data file, and records examine corresponding with the polar plot
Count information;
File destination is obtained, when detecting in the file destination there are when the polar plot, polar plot generating algorithm is decrypted, obtains
The audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
2. data security protection method as described in claim 1, which is characterized in that by HOOK technologies, pre-define sensitivity
Data rule judges to be accessed whether data are sensitive data when user accesses data file by rule verification.
3. data security protection method as described in claim 1, which is characterized in that the sensitive data file passes in order to control
The data file broadcast, to circulate.
4. data security protection method as described in claim 1, which is characterized in that the sensitive data file is to be added to spy
Different label, to show the file of security sensitive.
5. data security protection method as described in claim 3 or 4, which is characterized in that the polar plot is to make an addition to sensitivity
Dot in data file white space.
6. a kind of data security protecting system, which is characterized in that the system comprises:
Polar plot generation unit, for when detect user just in access sensitive data file when, generate polar plot at random;
Print auditing unit, the white space for the polar plot to be made an addition to the sensitive data file, and record and institute
State the corresponding audit information of polar plot;
Audit information acquiring unit, when detecting in the file destination there are when the polar plot, is solved for obtaining file destination
Close polar plot generating algorithm, obtains the audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
7. data security protecting system as claimed in claim 6, which is characterized in that by HOOK technologies, pre-define sensitivity
Data rule judges to be accessed whether data are sensitive data when user accesses data file by rule verification.
8. data security protecting system as claimed in claim 6, which is characterized in that the sensitive data file passes in order to control
The data file broadcast, to circulate.
9. data security protecting system as claimed in claim 6, which is characterized in that the sensitive data file is to be added to spy
Different label, to show the file of security sensitive.
10. data security protecting system as claimed in claim 8 or 9, which is characterized in that the polar plot is to make an addition to sensitivity
Dot in data file white space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810415380.3A CN108563931A (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510491248.7A CN105095791B (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
CN201810415380.3A CN108563931A (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510491248.7A Division CN105095791B (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108563931A true CN108563931A (en) | 2018-09-21 |
Family
ID=54576190
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810415380.3A Pending CN108563931A (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
CN201510491248.7A Active CN105095791B (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510491248.7A Active CN105095791B (en) | 2015-08-12 | 2015-08-12 | A kind of data security protection method and system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN108563931A (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106228075A (en) * | 2016-07-18 | 2016-12-14 | 刘日初 | A kind of document handling method and device |
CN106228083A (en) * | 2016-07-18 | 2016-12-14 | 刘日初 | A kind of document handling method, device, server and terminal |
CN108229180B (en) * | 2016-12-09 | 2022-02-08 | 阿里巴巴集团控股有限公司 | Screenshot data processing method and device and electronic equipment |
CN108174051B (en) * | 2017-12-08 | 2019-11-08 | 新华三技术有限公司 | A kind of vector watermark decoding method, device and electronic equipment |
CN108520181B (en) * | 2018-03-26 | 2022-04-22 | 联想(北京)有限公司 | Data model training method and device |
CN113342288B (en) * | 2021-06-29 | 2024-03-22 | 北京天空卫士网络安全技术有限公司 | Data protection method, client, server and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101308541A (en) * | 2007-05-16 | 2008-11-19 | 北京中富利泰科技发展有限公司 | Method for embedding computer data out of text handwriting |
CN101482887A (en) * | 2009-02-18 | 2009-07-15 | 北京数码视讯科技股份有限公司 | Anti-tamper verification method for key data in database |
CN101894239A (en) * | 2010-08-12 | 2010-11-24 | 武汉大学 | Method and system for auditing and distributing sensitive data based on evolution strategy |
CN102143158A (en) * | 2011-01-13 | 2011-08-03 | 北京邮电大学 | Data anti-leakage method based on trusted platform module (TPM) |
CN104462995A (en) * | 2014-11-28 | 2015-03-25 | 福建畅云安鼎信息科技有限公司 | Digital processing safety protection system |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100461215C (en) * | 2007-10-29 | 2009-02-11 | 中国人民解放军信息工程大学 | Map data rasterizing based robust blind water mark embedding and extraction method |
CN102541482B (en) * | 2010-12-27 | 2015-01-21 | 北大方正集团有限公司 | Method and system for document printing control and document tracing |
CN102622560A (en) * | 2011-01-27 | 2012-08-01 | 昆山玛斯特软件有限公司 | Method for preventing electronic secret documents from being divulged in shooting or printing mode |
CN102930634B (en) * | 2012-10-31 | 2015-10-28 | 浪潮软件集团有限公司 | Invoice true-check system based on cloud computing and encrypted two-dimensional code |
CN103886539A (en) * | 2014-02-26 | 2014-06-25 | 浙江工业大学 | Embedding and detection method of circular characteristic digit fingerprint |
CN104794677A (en) * | 2015-05-05 | 2015-07-22 | 哈尔滨工程大学 | Vector map watermark method based on space geometric features |
-
2015
- 2015-08-12 CN CN201810415380.3A patent/CN108563931A/en active Pending
- 2015-08-12 CN CN201510491248.7A patent/CN105095791B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101308541A (en) * | 2007-05-16 | 2008-11-19 | 北京中富利泰科技发展有限公司 | Method for embedding computer data out of text handwriting |
CN101482887A (en) * | 2009-02-18 | 2009-07-15 | 北京数码视讯科技股份有限公司 | Anti-tamper verification method for key data in database |
CN101894239A (en) * | 2010-08-12 | 2010-11-24 | 武汉大学 | Method and system for auditing and distributing sensitive data based on evolution strategy |
CN102143158A (en) * | 2011-01-13 | 2011-08-03 | 北京邮电大学 | Data anti-leakage method based on trusted platform module (TPM) |
CN104462995A (en) * | 2014-11-28 | 2015-03-25 | 福建畅云安鼎信息科技有限公司 | Digital processing safety protection system |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
Also Published As
Publication number | Publication date |
---|---|
CN105095791A (en) | 2015-11-25 |
CN105095791B (en) | 2018-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105095791B (en) | A kind of data security protection method and system | |
Al Hamid et al. | A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography | |
Al‐Haj et al. | Crypto‐based algorithms for secured medical image transmission | |
CN107315968B (en) | A kind of data processing method and equipment | |
JP5269033B2 (en) | Image privacy masking method and apparatus | |
KR101378295B1 (en) | Method and Apparatus of privacy masking on Image | |
CN105260148B (en) | Printing document Jianzhen source tracing method and system based on electronic tag | |
Hakak et al. | Preserving content integrity of digital holy Quran: Survey and open challenges | |
US20130011068A1 (en) | Policy-Based Image Management | |
WO2016115889A1 (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
US9608811B2 (en) | Managing access to a secure digital document | |
CN106407820B (en) | Method and system for preventing file from being tampered and leaked through watermark encryption | |
Zhang et al. | F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption | |
KR101429304B1 (en) | Entering confidential information on an untrusted machine | |
WO2019134276A1 (en) | Method and system for protecting web page code, storage medium, and electronic device | |
CN110032877A (en) | Image access method and its system | |
CN101641701A (en) | Device and method for digital processing management of content so as to enable an imposed work flow | |
US20140115331A1 (en) | Secure Information Transfer Via Bar Codes | |
Mubarak et al. | A critical review on RFID system towards security, trust, and privacy (STP) | |
Konings et al. | PrivacyJudge: Effective privacy controls for online published information | |
CN106844006A (en) | Based on data prevention method and system under virtualized environment | |
CN107862210A (en) | Cipher processing method, system and computer equipment | |
Pilania et al. | Digitization through SNS: issues, challenges, and recommendations—a case study | |
Prokos et al. | Squint hard enough: Attacking perceptual hashing with adversarial machine learning | |
Sharma et al. | A more private & secure e-mail system using image steganography (EPS) and data mining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180921 |
|
RJ01 | Rejection of invention patent application after publication |